Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
64c3893dd25da9a6e9a5c078dd1d9dbb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
64c3893dd25da9a6e9a5c078dd1d9dbb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
64c3893dd25da9a6e9a5c078dd1d9dbb_JaffaCakes118.html
-
Size
19KB
-
MD5
64c3893dd25da9a6e9a5c078dd1d9dbb
-
SHA1
1fbb4b0c501a986b140f84d487d62f4803f09fd1
-
SHA256
48878e01e5edcb33679fb6059de6705e1eb7d3664c35bb3d3e778838c22d9c7c
-
SHA512
19527708dc3c9c8716e05c262557e123d617f0016f29bca32bc42a9b007dc72e4caa4920cfb948930a3b3c17288681ad332de14e26b3e923fd74f6cbd7153856
-
SSDEEP
192:Vf5cVZ7oxo6wLdtaO4ba08EFhI04YLXUS07dWZSj0VuPfKtH8iXMf5gnnLall88o:B5cVZeKtreMu8dWZSj0VuPfKoo
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427845690" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{990AB9C1-4871-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20811c6f7edcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000fe31c290a430ab739b4ec40ee9a2c59861ddda62365528ffb081f6a41734118b000000000e8000000002000020000000a501e8e50450f3d5f6799755b8fb7dfc74b91bc038e4dbef47cac382fee711e3200000006f4c67572ed46e951878528898f3f8bfb69da651fe8c01e6141c01a6aff3832140000000425f6871820f31ee9e47a610e272e29bf110c795d7a62540eb3dbdf16faffc69b338f3bd4fed786485d1580f4c7c664680669ca94192937f1d6bd31038a610da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2808 2380 iexplore.exe 29 PID 2380 wrote to memory of 2808 2380 iexplore.exe 29 PID 2380 wrote to memory of 2808 2380 iexplore.exe 29 PID 2380 wrote to memory of 2808 2380 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\64c3893dd25da9a6e9a5c078dd1d9dbb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c065c957bb66dda5769f61c90d9608
SHA1f231ae5843ea075ad898458d45188c22879e3c33
SHA2560135294e490193ab9271f20e30cdc1f5f31d0ed286b2d1f6d92ab95149689aa2
SHA512a73d5d15c8bee9c1e42a9fe94afe2f9d21b40556f6cb11c64c9acf73201c2ed952ffae34c90ad3836229f5197ff233804253cd95ab97b9a31da0ce2b8571c549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd65cc1d7ede1172725affc0664dd0c
SHA19eaf44f87811504b33d1d1fbd51ab524d326150f
SHA256c9240daa10816f6907cb02d6f22ecb894ac8684085bd7c2bf6303961e3b4142d
SHA5124f7b1e7174339370183beaca346f68c20dbc1156f4c5344990dc93dd1cbb734d07be55f4ad2ba3df32ef5e106773748e44388e964bfb360b54612b7db8c3e0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57335f3c887eaae545e3b5a80e5d9c220
SHA15af8f6894cc4124a8835a1fe23007bcd8228253b
SHA256f426a5b828b13cf3492cfdd374b01c7690970e362ecab748482e1e6caea1081e
SHA5124978da275317404d84ef90bd05294c8920fc805f0225a111fcd89555dc61f749a86bfdb205d6878c62db6b453d5cebe7cec11820ab073b7bcc90c158fe2ae92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf608869552f24c0ae637e5062afb8eb
SHA19b77707099d5a5ff336bf8daf1b5dded9855dd54
SHA256c4ffa107d68b3df7d7dcc908543aa21945d01a08cadd36134ced7ff3fdb876a5
SHA51234046a3f44a5bd6c54f547a7dc9d0ebd2136e2c4c478ec642611e5aa554e5caffca0c18e71cc11a9eab377a8ed0c966f47b63ef4715e7ed731d89060d4d15540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12cd74a8cfa6055a7a1cffa3c097169
SHA1ccb389de2769384a53922f469b89e1fe36664bfd
SHA256394e515f43387e2cce60d10b1280d4ff274c0606b12632ac28508765de5ad228
SHA512aaa27182fe58c354239ccd1f65d24905733f7052cf1d679e5daed9a276edb98f407d372a0d190e4821dc418efe591808e4c2b86560ef61cd95c0699abad517d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f48492c87f6043216011efc08abf78
SHA12cb0bc7309c0c2478e5e50daa02759de64c8c548
SHA256f2bb8b1a425b617b09512840beaf004c6c16d3f11379265946a694e9207b9de1
SHA512d4247764d92c562eb635a001958971d3417d04cc182c775a9f7bcb916e419e43ad73d655c4b35427d093d3213e4031b534d15962167fcd3b5801cebc48e06376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6a9383ca78caab73d5e76a8e4cd2ef
SHA101a8dda17e608af7b1f37c8c6b23381396a21f66
SHA256e3e76beaf17ac15bc6e7976c600e73e37b156e4b9a7a8d0d338005174d89e59f
SHA51283824083255f9cbfb54081ac1d027bf60a8b533b969be2e5872879c19e01bc45fac075493e3e3779109e139716b48be484834c6a04f862a7b3f1764e4b038b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f68fb5d1ac53602ca406085c6058b8c
SHA1a4c998eb9b1906a9bfe470e599a88824a597ef00
SHA2568f95ea904c0a6c99003e97aee35627eac481b8537fbe121f230c4410eb6e9d8d
SHA51271e1d42ba881772155a375e2187392d5ff4d3ea1e12f87684e109f4c0b0388f7773752e68ceec636b61700962cf9e99ef6b1b80f8fa5a8ff3bf4643f9352d569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bd307ef3d23dff6584135fc02e4293
SHA19d418dfb2a0726d1a4791ce5216ca1ad5171b8d0
SHA256e50ab7a04682807e7d7610d1a237c165bb6251913a99d12e3a8ae325ff5ded58
SHA512a6b47e4b646c1ce0655e6d273ab0d53eb9d7cd8951dd682a3ca67bff5b63b73914b17b0b73a83cf61727b0b519c2a7a8017af03fed460d5a7f4e29eee74fe311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60d2bd767e969a7b9177cc3d190e333
SHA190e43e75a6a7f2243dc58f92592f5e879205dbfe
SHA256fc6ce3d374dc8c85f1696b5dca2530d6b650ce3f04d3595fc2ea9cfadca54046
SHA512d7a6d49ba24429cea719f693371cc57ab950868041c7a201cc9deef555a69ea30e734a6c7c0b333c44b36db52aedba221752e938d00235d4b2879650390d68bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f37bf87543c9a023d2ec4740683017e
SHA173f47d31a5f8a588d9e337511e554adf414dfe0b
SHA256e02345e247263386db16d6a2cb7c5649cdf4efdb8860ecb0f47ecd81742aa204
SHA512ea758fd874f685bd6068a9483e9595eb428e05c4f072b3d6e958eb583ca13409972793590a77ffbc5882c560660bb7c32fb2edfd0f181ec8830c3da3caba3028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babb69a4c5e74670fb82463ab2a60e77
SHA15efca853980cc9f8231ce61619bfc3fada2e10e9
SHA2562b25abc6c5952d7fed8e55d8931fac3e535dca2b9f23ee9f94cf0c063b429a01
SHA512f9a5c191314f9b295d0aecc4c78a1cf14f626b04a3ce66fa8dfd95ee1f872d70e910c53e6059f0ed8ef7c2bd48bd23989495a0a8b4bc6378e1b5be70ca230bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6a6b3b476989240dc7a7bcb27af2d9
SHA1a82b0a415934bda0a3274f2c25d5b16b5b793838
SHA25618179ad8f5bbc5ce8138c80a827e5912813c09af0f469390b50f0bf34073cd5d
SHA51253f88f69a66f9e6ec1a46beba9b3c600ae0cdf9ede3eb449a4d5960a540b79546d7f155ebe31f556255d7509ec1f0be954ff44605ad769f79fde151205284041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c1f9bb221e3e43a53104d56f09141f
SHA1a1313c6c7bcefca52acb1f621a55d645448ce458
SHA256acfe120da7edbd9b7d3770f037cf330ad586e35a62d1f95f390081157c51723c
SHA512f7bf25421a03f338e5828725e36a5ceacca39e1516a0da588dfbc3625f5a61f25f3e9b4ce0f0eb0742acca9bdb60b12ccba52afb244f06b706fb86f22d0be342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39fcd52115a2e303c8fe22e63fd2de5
SHA1e136c9fae8bd0c84d46d398288ff423ed62563b2
SHA256f64096c620ecd1640c1c5e49a2a37d9cea6c073e3809b623f170f879bc2ef822
SHA512e8a6e27fadf7725fd84d066eaca544b2d430b8cd6f972c067675bdae435e4125d2619074ab3600ee9beddc028409fdd83064bfe2eae7c0ef93e1321e00ea07b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e2b4da6389cd32c42d18b2c1aab5b2
SHA1b025e0dc8b8940bca7e43c1c18c1333c2d76fcbc
SHA256e40edd054adc809c7676f67df8e3cdd762f8be939309713fae24827b8ee9b7a0
SHA512a62771c532ade57959b0ccedf07ea5e75d9fdbec72a489e0738d5c07f3fe09f38b0abe80ff0cb929147a07bb063d07e0cfdeded74e1a309e30676b3a345fa1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e186d6aabfe151a08f826d312a43d6
SHA1eae038e63ab997a21365ff9abdedf06726b59ae5
SHA256f1b067f87e96e7add28ca8b18db4d9cac8587afb340c54f965de487f43a389a9
SHA5120aace8cd15518affd1e3d930bbb22586572bfa6836c5fb9f050a4857a635872432eea30911c12c12a88e56d286d87cc392e07cd1e0081e98bffff25bfd8fbd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d447f145f9c4477d4a1f543b48d5b18
SHA1aa95ea7e7b9bbe391c7ad8ccaa4c4b5f36cc65a0
SHA2563981271b1a8c499edcba5989089cf1b65ff01aaf620713a51c37f5416b3dec4a
SHA5121a4eca44fbfb78d4ff436b87d85c6aa4b9cee70d047a7ef520c85461c6018adb2ecbc6d9c59261b67df6b85fda31a1e37a22abd7ebbbf2a1f0504941d092cc51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dcae4070cd73eee36c75f4e865f66d0
SHA1e6a482489719710c805a014412a85c78b9114f9f
SHA256e1ad611828c3b5503ab70c5979ed3fc4f8ad75982a9b65a401609f1843c02ec8
SHA512ecbf1bc2e4fb01605f0045b90ec4c37113113ad13dc354586f2a726e853e5fb504ff4e8591d4393304f881edaf71eacd9b8823b0e1aa95d48e307a055e0017f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b